Aggregator
CVE-2011-2520 | Red Hat system-config-firewall up to 1.2.29 access control (Bug 717985 / Nessus ID 68307)
CVE-2011-2555 | Cisco Telepresence Recording Server Software up to 1.7.1 Administrator Account credentials management (XFDB-68887 / SBV-32537)
CVE-2011-2402 | HP Network Automation 9.10 cross site scripting (Nessus ID 70100 / XFDB-68885)
CVE-2011-2403 | HP Network Automation 9.10 sql injection (Nessus ID 70100 / XFDB-68886)
CVE-2011-2400 | HP SiteScope up to 11.1 cross site scripting (XFDB-68867 / SBV-32599)
CVE-2011-2401 | HP SiteScope up to 11.1 session fixiation (XFDB-68868 / SBV-32600)
CVE-2011-2399 | HP Data Protector up to 6.10 denial of service (Nessus ID 53857 / XFDB-68865)
The Curious Case of an Egg-Cellent Resume
CVE-2015-0851 | XMLTooling-C up to 1.5.4 XML Data xmltooling/base.h numeric error (Nessus ID 85280 / ID 175472)
CVE-2015-0852 | FreeImage up to 3.17.0 PluginPCX.cpp height/width numeric error (FEDORA-2015-992342e82f / Nessus ID 86173)
CVE-2015-0855 | pitivi up to 0.94 File Path mainwindow.py mediaLibraryPlayCb code injection (FEDORA-2016-cbb76d0e3a / Nessus ID 89615)
CVE-2015-0859 | Debian Linux 7/8 smokeping smokeping_cgi code (Nessus ID 87078 / ID 175569)
CVE-2010-1199 | Mozilla Firefox up to 3.6.3 numeric error (Bug 554255 / EDB-14949)
msInvader: M365/Azure adversary simulation tool
msInvader msInvader is an adversary simulation tool built for blue teams, designed to simulate adversary techniques within M365 and Azure environments. Its purpose is to generate attack telemetry that aids teams in building, testing,...
The post msInvader: M365/Azure adversary simulation tool appeared first on Penetration Testing Tools.
gtirb: Intermediate Representation for Binary analysis and transformation
GTIRB The GrammaTech Intermediate Representation for Binaries (GTIRB) is a machine code analysis and rewriting data structure. It is intended to facilitate the communication of binary IR between programs performing binary disassembly, analysis, transformation,...
The post gtirb: Intermediate Representation for Binary analysis and transformation appeared first on Penetration Testing Tools.
intelmq: collecting and processing security feeds
IntelMQ is a solution for IT security teams (CERTs, CSIRTs, abuse departments,…) for collecting and processing security feeds (such as log files) using a message queuing protocol. It’s a community-driven initiative called IHAP (Incident Handling...
The post intelmq: collecting and processing security feeds appeared first on Penetration Testing Tools.